Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends
☆26Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for APTv4_Defcon28
Users that are interested in APTv4_Defcon28 are comparing it to the libraries listed below
Sorting:
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆163Nov 29, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- ☆15Mar 12, 2025Updated 11 months ago
- Atomic Purple Team Framework and Lifecycle☆299Feb 11, 2021Updated 5 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 6 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 20, 2026Updated last week
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- ☆18Mar 26, 2025Updated 11 months ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated last month
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆15Apr 3, 2019Updated 6 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 7 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- ☆50Jan 30, 2026Updated last month
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- ☆25Jun 5, 2023Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago